security.c (9938b04472d5c59f8bd8152a548533a8599596a2) | security.c (9b091556a073a9f5f93e2ad23d118f45c4796a84) |
---|---|
1/* 2 * Security plug functions 3 * 4 * Copyright (C) 2001 WireX Communications, Inc <chris@wirex.com> 5 * Copyright (C) 2001-2002 Greg Kroah-Hartman <greg@kroah.com> 6 * Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com> 7 * 8 * This program is free software; you can redistribute it and/or modify --- 46 unchanged lines hidden (view full) --- 55{ 56 pr_info("Security Framework initialized\n"); 57 58 /* 59 * Load minor LSMs, with the capability module always first. 60 */ 61 capability_add_hooks(); 62 yama_add_hooks(); | 1/* 2 * Security plug functions 3 * 4 * Copyright (C) 2001 WireX Communications, Inc <chris@wirex.com> 5 * Copyright (C) 2001-2002 Greg Kroah-Hartman <greg@kroah.com> 6 * Copyright (C) 2001 Networks Associates Technology, Inc <ssmalley@nai.com> 7 * 8 * This program is free software; you can redistribute it and/or modify --- 46 unchanged lines hidden (view full) --- 55{ 56 pr_info("Security Framework initialized\n"); 57 58 /* 59 * Load minor LSMs, with the capability module always first. 60 */ 61 capability_add_hooks(); 62 yama_add_hooks(); |
63 loadpin_add_hooks(); |
|
63 64 /* 65 * Load all the remaining security modules. 66 */ 67 do_security_initcalls(); 68 69 return 0; 70} --- 1772 unchanged lines hidden (view full) --- 1843 LIST_HEAD_INIT(security_hook_heads.tun_dev_free_security), 1844 .tun_dev_create = 1845 LIST_HEAD_INIT(security_hook_heads.tun_dev_create), 1846 .tun_dev_attach_queue = 1847 LIST_HEAD_INIT(security_hook_heads.tun_dev_attach_queue), 1848 .tun_dev_attach = 1849 LIST_HEAD_INIT(security_hook_heads.tun_dev_attach), 1850 .tun_dev_open = LIST_HEAD_INIT(security_hook_heads.tun_dev_open), | 64 65 /* 66 * Load all the remaining security modules. 67 */ 68 do_security_initcalls(); 69 70 return 0; 71} --- 1772 unchanged lines hidden (view full) --- 1844 LIST_HEAD_INIT(security_hook_heads.tun_dev_free_security), 1845 .tun_dev_create = 1846 LIST_HEAD_INIT(security_hook_heads.tun_dev_create), 1847 .tun_dev_attach_queue = 1848 LIST_HEAD_INIT(security_hook_heads.tun_dev_attach_queue), 1849 .tun_dev_attach = 1850 LIST_HEAD_INIT(security_hook_heads.tun_dev_attach), 1851 .tun_dev_open = LIST_HEAD_INIT(security_hook_heads.tun_dev_open), |
1851 .skb_owned_by = LIST_HEAD_INIT(security_hook_heads.skb_owned_by), | |
1852#endif /* CONFIG_SECURITY_NETWORK */ 1853#ifdef CONFIG_SECURITY_NETWORK_XFRM 1854 .xfrm_policy_alloc_security = 1855 LIST_HEAD_INIT(security_hook_heads.xfrm_policy_alloc_security), 1856 .xfrm_policy_clone_security = 1857 LIST_HEAD_INIT(security_hook_heads.xfrm_policy_clone_security), 1858 .xfrm_policy_free_security = 1859 LIST_HEAD_INIT(security_hook_heads.xfrm_policy_free_security), --- 36 unchanged lines hidden --- | 1852#endif /* CONFIG_SECURITY_NETWORK */ 1853#ifdef CONFIG_SECURITY_NETWORK_XFRM 1854 .xfrm_policy_alloc_security = 1855 LIST_HEAD_INIT(security_hook_heads.xfrm_policy_alloc_security), 1856 .xfrm_policy_clone_security = 1857 LIST_HEAD_INIT(security_hook_heads.xfrm_policy_clone_security), 1858 .xfrm_policy_free_security = 1859 LIST_HEAD_INIT(security_hook_heads.xfrm_policy_free_security), --- 36 unchanged lines hidden --- |